Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14882: CWE-639 Authorization Bypass Through User-Controlled Key in pretix pretix-offlinesales

0
Low
VulnerabilityCVE-2025-14882cvecve-2025-14882cwe-639
Published: Fri Dec 19 2025 (12/19/2025, 12:24:01 UTC)
Source: CVE Database V5
Vendor/Project: pretix
Product: pretix-offlinesales

Description

An API endpoint allowed access to sensitive files from other users by knowing the UUID of the file that were not intended to be accessible by UUID only.

AI-Powered Analysis

AILast updated: 12/26/2025, 12:58:19 UTC

Technical Analysis

CVE-2025-14882 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting pretix-offlinesales version 1.12.0. The flaw exists in an API endpoint that allows authenticated users with limited privileges to access sensitive files belonging to other users simply by knowing the UUID of those files. The UUID acts as a user-controlled key, and the system fails to properly verify whether the requesting user is authorized to access the file associated with that UUID. This results in unauthorized disclosure of sensitive information. The vulnerability has a CVSS 4.0 base score of 3.8, indicating low severity, primarily because it requires authentication with limited privileges and does not require user interaction. The impact is mainly on confidentiality, as unauthorized users can read files they should not have access to. There is no impact on integrity or availability. No known exploits have been reported, and no patches have been published at the time of disclosure. The vulnerability was published on December 19, 2025, and is assigned to the pretix project, which is an event ticketing software widely used in Europe. The lack of proper authorization checks on UUID-based file access points to a design flaw where the UUID is treated as a secret token rather than an identifier requiring access control enforcement.

Potential Impact

For European organizations using pretix-offlinesales 1.12.0, this vulnerability poses a risk of unauthorized disclosure of sensitive files, potentially including personal data or confidential event-related information. This can lead to privacy violations under GDPR, reputational damage, and loss of customer trust. Although the severity is low, the exposure of sensitive files could facilitate further attacks or data leaks. Organizations in sectors such as event management, cultural institutions, and ticketing services across Europe are particularly at risk. The impact is heightened in countries with strict data protection regulations, where unauthorized data access can result in significant fines and legal consequences. Since the vulnerability requires authentication with limited privileges, insider threats or compromised user accounts could be leveraged to exploit this flaw. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks once the vulnerability becomes widely known.

Mitigation Recommendations

Until an official patch is released, European organizations should implement the following mitigations: 1) Restrict access to the pretix-offlinesales API endpoints to trusted networks and users only, minimizing exposure. 2) Monitor and audit API access logs for unusual access patterns or attempts to access files by UUIDs not owned by the requesting user. 3) Enforce strict user privilege management to limit the number of users with access to the vulnerable API. 4) Implement additional application-layer access controls or reverse proxies that validate user authorization before forwarding requests to the vulnerable endpoint. 5) Educate users and administrators about the risk and encourage strong credential hygiene to reduce the risk of account compromise. 6) Engage with the pretix vendor or community to obtain updates on patch availability and apply fixes promptly once released. 7) Consider temporary disabling or restricting the use of the offlinesales feature if feasible, to eliminate the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
rami.io
Date Reserved
2025-12-18T11:52:58.280Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6945478da90e3c9a1530ec0e

Added to database: 12/19/2025, 12:39:41 PM

Last enriched: 12/26/2025, 12:58:19 PM

Last updated: 2/7/2026, 2:58:46 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats